Found: 10

Select item for more details and to access through your institution.

  • PLATFORMS, ENCRYPTION, AND THE CFAA: THE CASE OF WHATSAPP V. NSO GROUP.

    Published in:
    Berkeley Technology Law Journal, 2021, v. 36, n. 1, p. 469, doi. 10.15779/Z384B2X554
    By:
    • Penney, Jonathon W.;
    • Schneier, Bruce
    Publication type:
    Article
  • Privacy threats in intimate relationships.

    Published in:
    Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa006
    By:
    • Levy, Karen;
    • Schneier, Bruce
    Publication type:
    Article
  • Techscope : (An Occasional Survey of Comments & Events).

    Published in:
    Knowledge, Technology & Policy, 2004, v. 17, n. 3/4, p. 4
    By:
    • Kerr, Orin;
    • McCullagh, Declan;
    • Schneier, Bruce
    Publication type:
    Article
  • Blaster and the August 14th Blackout.

    Published in:
    Knowledge, Technology & Policy, 2003, v. 16, n. 3, p. 21
    By:
    • Schneier, Bruce
    Publication type:
    Article
  • Techscope.

    Published in:
    Knowledge, Technology & Policy, 2003, v. 16, n. 2, p. 8, doi. 10.1007/s12130-003-1022-8
    By:
    • Geist, Michael;
    • Pagnis, Rishikesh;
    • Schneier, Bruce;
    • Trei, Peter;
    • Cassy, John;
    • Murphy, Paul;
    • Plummer, James;
    • Mehta, Nitin
    Publication type:
    Article
  • SAVING PRIVACY.

    Published in:
    Boston Review, 2014, v. 39, n. 3, p. 14
    By:
    • Hundt, Reed;
    • Ammori, Marvin;
    • Kern, Adam;
    • Stallman, Richard M.;
    • MacKinnon, Rebecca;
    • Fung, Archon;
    • Pasquale, Frank;
    • Granick, Jennifer;
    • Schneier, Bruce;
    • Kessler, Jeremy K.;
    • Morozov, Evgeny
    Publication type:
    Article
  • Census of cyberspace censoring.

    Published in:
    2008
    By:
    • Schneier, Bruce
    Publication type:
    Book Review
  • Protecting privacy and liberty.

    Published in:
    Nature, 2001, v. 413, n. 6858, p. 773, doi. 10.1038/35101663
    By:
    • Schneier, Bruce
    Publication type:
    Article
  • Security ROI: fact or fiction?

    Published in:
    ComputerWorld Hong Kong, 2008, v. 25, n. 9, p. 30
    By:
    • Schneier, BRuce
    Publication type:
    Article
  • MAKING DEMOCRACY HARDER TO HACK.

    Published in:
    University of Michigan Journal of Law Reform, 2017, v. 50, n. 3, p. 629, doi. 10.36646/mjlr.50.3.making
    By:
    • Shackelford, Scott J.;
    • Schneier, Bruce;
    • Sulmeyer, Michael;
    • Boustead, Anne;
    • Buchanan, Ben;
    • Craig Deckard, Amanda N.;
    • Herr, Trey;
    • Smith, Jessica Malekos
    Publication type:
    Article